User's Guide
Table Of Contents
- ExtremeAnalytics® User GuideVersion 8.4
- Legal Notices
- Trademarks
- Contact
- Extreme Networks® Software License Agreement
- Table of Contents
- ExtremeAnalytics™ Help
- ExtremeAnalytics Licensing
- Configuring Enhanced Netflow for Extreme Analytics and Extreme Wireless Contr...
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Tab Overview
- ExtremeAnalytics Dashboard Overview
- ExtremeAnalytics Insights Dashboard
- ExtremeAnalytics Tracked Applications Dashboard
- ExtremeAnalytics Browser Overview
- ExtremeAnalytics Application Flows
- ExtremeAnalytics Fingerprints Overview
- ExtremeAnalytics Custom Fingerprints
- Delete Custom Fingerprints
- Custom Fingerprint Examples
- Create Custom Fingerprints Based on Flow
- Create Custom Fingerprints Based on Destination Address
- Create Custom Fingerprints Based on Application or Application Group
- ExtremeAnalytics Packet Captures
- ExtremeAnalytics Configuration Overview
- Virtual Sensors
- ExtremeAnalytics Engine Advanced Configuration
- Flow Collection Type
- Collection Privacy Levels
- Client Aggregation
- Slow Client Data
- Max End-Systems in Hourly Details
- Sensor Log Levels
- Store Application Site Data
- ExtremeControl Integration
- Flow Sources/Application Telemetry Sources
- Web Credentials
- Configuration Properties
- Sensor Modules
- Auditing
- Network Settings
- ExtremeAnalytics Reports
- ExtremeAnalytics Report Descriptions
- Report Descriptions
- Analytics Events
- Bandwidth for a Client Over Time
- Interface Top Applications Treemap
- Sites Using the Most Bandwidth
- Most Popular Applications
- Most Used Applications for a Client
- Most Used Applications for a User Name
- Network Activity by Site
- Network Activity by Client
- Network Activity by Application
- Slowest Applications by Site
- Top Applications Group Radar
- Top Applications Radar
- Top Applications TreeMap
- Top Applications for Interface
- Top Applications for Server
- Top Clients by Interface
- Top Interfaces by Application
- Top N Applications
- Top N Clients
- Top N Servers
- Report Descriptions
- Add and Modify Fingerprints
- Add Fingerprints
- Enable or Disable Fingerprints
- Modify Fingerprints
- Update Fingerprints
- Custom Fingerprint Examples
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Virtual Sensor Configuration in Extreme Management Center
- Stream Flow Data from ExtremeAnalytics into Splunk
- Stream Flow Data from ExtremeAnalytics into Elastic Stack
Data Collector Types
45 of 218
You can define your internal network by configuring sites. A site is a set of IP
masks that defines a well-known portion of your internal network. You can use
the World site to identify your entire internal network. If you have already
reserved certain IP address ranges for certain physical sites on your network, you
can create multiple sites that correspond to these reserved IP ranges. Multiple
sites can be created to identify different buildings, sites, or geographical areas of
your network. Any IP that matches any site is considered to be in-network. If you
define multiple sites, you will be able to analyze data broken down by site.
Data Collector Types
There are two kinds of data collectors used in ExtremeAnalytics.
l General Usage Collectors — These are hourly and high-rate collectors that record
the top targets during an interval. Many types of targets and target-pairs are
supported.
l End-System Details Collector — This is an hourly collector that attempts to capture
and record data for all in-network clients and servers that it detects. All traffic
collected is tagged with site, profile, device family, and other attributes.
Data from these collectors is stored separately in the database. The collector
data used in a report depends on the nature of the report. Higher-level
information, such as top applications during an hour, will be based on general
usage collector data, since it is relatively inexpensive to access. End-system
details data might be used when data for a specific client or server is needed, or
when the information requested is highly specific, for example, top applications
used by Android devices in the London site.
General Usage Collectors
General usage collectors collect data about all instances of a target for the
interval, and then record only the most significant targets (typically, the 100
most significant targets).
When the top targets are calculated for a collection interval, several different
statistics can be used as a basis for choosing the most significant entries. For
example, collectors can record the top applications based on bytes, and also
record the top applications based on number of clients. For each type of target
collected, there are different sets of bases used.